drjobs Network Security Engineer

Network Security Engineer

Employer Active

1 Vacancy
drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
Send me jobs like this
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs
Job Location drjobs

Austin - USA

Monthly Salary drjobs

Not Disclosed

drjobs

Salary Not Disclosed

Vacancy

1 Vacancy

Job Description

US ResidentsNSE3 Closes 10/03
Location: Hybrid - Position may require team members to come into the office; there may be unscheduled requests with seventy-two (72) hour notice for any TWC business need.

Introduction
The Texas Workforce Commission (TWC) requires the services of one (1) Network Security Engineer Level 3 hereafter referred to as Worker(s) who meets the general qualifications of ITSAC Network Security Engineer Level 3 and the specifications outlined in this document for TWC.

Scope/Description of Services
The Worker(s) will provide the following services: Perform advanced (senior level) cybersecurity analysis work essential for TWC Information Technology (IT) to fulfill its mission of service to people who live in Texas. Work involves protecting cybersecurity cloud assets and delivering cybersecurity threat assessment cyber intelligence software security and vulnerability assessment services. Collaborate with mixed-matrixed or multi-discipline teams across the agency in cybersecurity-related decision-making providing guidance and oversight in the implementation of improvements. Develop/integrate cybersecurity designs for systems and networks with multilevel security requirements or requirements for the processing of multiple classification levels of data. Document and address organizations information security cybersecurity cloud architecture and systems security engineering requirements throughout the acquisition life cycle. Ensure that acquired or developed system(s) and architecture(s) are consistent with organizations cybersecurity cloud architecture guidelines. Identify and prioritize critical business functions in collaboration with organizational stakeholders by performing security reviews identifying gaps in security architecture and developing security risk management plans and system security plans. Evaluate cloud security architectures and designs to determine the adequacy of security design and architecture proposed or provided in response to requirements contained in acquisition documents. Monitor IT security related websites newsgroups organizations and publications. Determine the protection needs (i.e. security controls) for the information system(s) and network(s) and document them appropriately. Work under minimal supervision with extensive latitude for the use of initiative and independent judgment. Work may involve occasional travel to other locations/work sites to perform TWC services. After hours support may be required to respond to security incidents. Perform other duties as assigned to maintain operations.
Minimum Requirements: Candidates that do not meet or exceed the minimum stated requirements (skills/experience) will not be considered for this opportunity. Years ( leave no
blanks) Years Skills/Experience Vendor Comments (as
applicable) 8 Graduation from an accredited four-year college or university with major coursework in cybersecurity information technology security computer engineering computer information systems computer science management information systems or a related field. Full-time qualifying work experience may be substituted for each year of the required education (one year 30 semester hours). 8 Experience in cybersecurity analysis or information security analysis. 8 Experience in security and/or enterprise architecture development implementation and management. 8 Experience in conducting security risk assessments and/or audits of policies standards procedures and technical environments within state and federal statues regulations and standards relating to information security and computer crime. 8 Excellent communication and presentation skills with the ability to articulate technical issues to all levels. 8 Strong consultative analytical and problem-solving skills. 8 Skills in translating operational requirements into protection needs (i.e. security controls) and to apply cyber security and privacy principles to organizational requirements (relevant to confidentiality integrity availability authentication non-repudiation.) 8 Skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions operations or the environment will affect these outcomes. 8 Skills in applying network security architecture concepts including topology protocols components and principles (e.g. application of defense-in-depth); to identify critical infrastructure systems with information communication technology that were designed without system security considerations.
Minimum Requirements: Candidates that do not meet or exceed the minimum stated requirements (skills/experience) will not be considered for this opportunity. Years ( leave no
blanks) Years Skills/Experience Vendor Comments (as
applicable) 8 Graduation from an accredited four-year college or university with major coursework in cybersecurity information technology security computer engineering computer information systems computer science management information systems or a related field. Full-time qualifying work experience may be substituted for each year of the required education (one year 30 semester hours). 8 Experience in cybersecurity analysis or information security analysis. 8 Experience in security and/or enterprise architecture development implementation and management. 8 Experience in conducting security risk assessments and/or audits of policies standards procedures and technical environments within state and federal statues regulations and standards relating to information security and computer crime. 8 Excellent communication and presentation skills with the ability to articulate technical issues to all levels. 8 Strong consultative analytical and problem-solving skills. 8 Skills in translating operational requirements into protection needs (i.e. security controls) and to apply cyber security and privacy principles to organizational requirements (relevant to confidentiality integrity availability authentication non-repudiation.) 8 Skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions operations or the environment will affect these outcomes. 8 Skills in applying network security architecture concepts including topology protocols components and principles (e.g. application of defense-in-depth); to identify critical infrastructure systems with information communication technology that were designed without system security considerations.
Years (as applicable) Years Skills/Experience Vendor Comment (as
applicable) 8 Being self-motivated proactive work independently and effectively manage your time.

Employment Type

Full-time

Company Industry

Report This Job
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.